In the part 3 we work on duplicated address groups, replacing duplicated address groups from other address groups and replacing them in security policy rules.
Copy and paste this URL into your WordPress site to embed
Copy and paste this code into your site to embed